Network Computing is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them. Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Develop a Patch Management Strategy: Page 2 of 2

So it's incumbent on IT organizations not only to prioritize the software that must be patched, but also to identify the systems whose patches must be tested. Meantime, they can reduce the exposure of their unpatched systems by implementing tiered security: firewalls, intrusion-prevention systems, updated antivirus software and the like. Even the most basic desktop defenses should have been enough to stop Zotob and its ilk.

For the more insidious threats, however, none of this "defense in depth" will get much easier. Gartner predicts that system prioritization and patch testing/deployment will remain largely manual tasks "well beyond 2007." And while security is being integrated into network infrastructure and packaged into all-in-one desktop suites, the attackers are getting more sophisticated as well.

Perhaps no other profession spends so much time fixing and defending flawed products purchased at considerable expense from reputable vendors. Regardless, if you don't have a patching strategy, develop one as part of a more comprehensive effort to understand your remaining security risks.

Rob Preston is editor in chief of Network Computing. Write to him at [email protected].